0% found this document useful (0 votes)
14 views2 pages

ITA2009_CRYPTOGRAPY

The document outlines the course ITA2009 on Cryptography, which aims to teach principles and practices of cryptography and network security. It includes modules covering topics such as symmetric and asymmetric ciphers, cryptographic hash functions, and message authentication codes, with a total of 45 lecture hours. The course also emphasizes practical applications and solutions to security problems in networked environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

ITA2009_CRYPTOGRAPY

The document outlines the course ITA2009 on Cryptography, which aims to teach principles and practices of cryptography and network security. It includes modules covering topics such as symmetric and asymmetric ciphers, cryptographic hash functions, and message authentication codes, with a total of 45 lecture hours. The course also emphasizes practical applications and solutions to security problems in networked environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

L T P J C

ITA2009 Cryptography
3 0 0 0 3
Pre-requisite ITA1006 Syllabus version
1.0
Course Objectives:
1. To explore the principles and practices of cryptography and network security.
2. To impart knowledge about cryptography, network-based security threats and
vulnerabilities.
3. To provide an exposure to practical solutions related to system and network security.

Expected Course Outcomes:


1. Deploy the knowledge of fundamental related to cryptography.
2. Analyze and apply various security models and standards.
3. Design security protocols and mechanisms for the provision of security services needed for
secure networked applications.
4. Apply the security techniques and technologies in solving real-life security problems in
practical systems.
5. Design the security protocols and functions using different mechanism.
6. Develop applications targeted for message authentication codes using different security
protocols and techniques.

Student Learning Outcomes (SLO) 2,9,18


Module:1 Introduction to Cryptography 6 hours
The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms,
Fundamental Security Design Principles , Attack Surfaces and Attack Trees , A model for
Internetwork Security.

Module:2 Symmetric Ciphers 5 hours


Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography,
The Data Encryption Standard

Module:3 Advanced Encryption Standard 6 hours


Finite Fields - Groups, Rings, Fields, Finite Fields of the Form GF(p), GF(2n). AES - AES
Structure, AES Transformation Function

Module:4 Block Cipher Operation 9 hours


Multiple Encryption and Triple DES, XTS-AES Mode for Block-Oriented Storage Devices,
Format-Preserving Encryption. Random Bit Generation and Stream Ciphers - Principles of
Pseudorandom Number Generation, Pseudorandom Number Generators, Pseudorandom Number
Generation using a Block Cipher

Module:5 Asymmetric Ciphers 6 hours


Principles of Public-Key Cryptosystems, The RSA Algorithm, Other Public-Key Cryptosystems -
Diffie–Hellman Key Exchange, Elgamal Cryptographic System, Elliptic Curve Cryptography

Module:6 Cryptographic Hash Functions 5 hours


Applications of Cryptographic Hash Functions, Two Simple Hash Functions, Hash Functions
Based on Cipher Block Chaining, Secure Hash Algorithm (SHA), SHA-3

Module:7 Message Authentication Codes 6 hours


Requirements, Functions, Security of MACs, MACs Based on Hash Functions: HMAC, DAA
and CMAC, CCM and GCM, Key Wrapping, PRNG based on Hash and MAC Function

Module:8 Expert Talk on Recent Trends 2 hours

Total Lecture hours: 45 hours

Text Book(s)
1. William Stallings, Cryptography and Network Security,2013, 6thEdition, Pearson Education.
Reference Books
1. BehrouzA, Ferouzan, Cryptography and Network Security, 2007,Tata McGraw Hill.

2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, 2002, Prentice Hall
of India.

Recommended by Board of Studies 12-6-2015


Approved by Academic Council No:37th Date 16-6-2015

You might also like